Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Practical Guide to Security for Activists

Practical Guide to Security for Activists

Ratings: (0)|Views: 8 |Likes:

More info:

Published by: Ocasionalmente Titulado Cockneyreject on Jul 11, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/11/2013

pdf

text

original

 
1
..::www. A c t i v i s t S e c u r i t y .org::..
 A Practical Security Handbook for Activists and Campaigns (v 2.7)
This guide is dedicated to all those who have died for freedom. Many have beenhonoured; many, many more have no one to recall their sacrifice. It does not takemuch to be a hero, just to stand up in the face of injustice, when the odds areoverwhelming, and stand firm for what you believe in. We honour them through our ownactions to preserve the liberties of others.
“ The price of freedom is eternal vigilance” 
Wendell Phillips or Thomas JeffersonDisclaimer: everything in this handbook is for information purposes only. Please donot use it to do anything illegal, but protect your right to protest and change theworld for a better place. We cannot take responsibility for your actions, though wesay that you should be as active as possible.
First 
 
Published 
 
October 
 
2004.
 
Version
 
2.7 
 
 published 
 
 June
 
2008
 
The
 
Activist
 
Security
 
Handbook
 
is
 
asserted
 
as
 
the
 
property
 
of 
 
the
 
ActivistSecurity.org
 
collective
 
and
 
is
 
licensed
 
under
 
a
 
Creative
 
Commons
 
Attribution
Non
Commercial
No
 
Derivative
 
Works
 
2.0
 
UK:
 
England
 
&
 
Wales
 
License.
 
For
 
details
 
of 
 
the
 
licence
 
view
 
http://creativecommons.org/licenses/by
nc
nd/2.0/uk/.
 
Please
 
do
 
not
 
alter
 
material
 
in
 
this
 
document
 
without
 
speaking
 
to
 
us
 
first.
 
If 
 
you
 
are
 
right
 
we
 
will
 
update
 
it,
 
but
 
wrong
 
information
 
can
 
put
 
lives
 
at
 
risk.
 
 
2
1
 
Introduction
 
1.1
 
Why
 
security
 
is
 
important
 
1.2
 
What
 
is
 
security?
 
1.3
 
Setting
 
up
 
the
 
‘security
 
process’
 
1.4
 
Other
 
Resources
 
<New
 
in
 
this
 
edition>
 
2
 
Security
 
For
 
Campaigns
 
2.1
 
Basic
 
campaign
 
security
 
a.
 
Media
 
strategy
 
b.
 
Your
 
address
 
c.
 
Answering
 
emails,
 
letters
 
&
 
phone
 
calls
 
d.
 
Websites
 
e.
 
Keep
 
files
 
encrypted
 
f.
 
Need
 
to
 
know
 
g.
 
Office
 
security
 
2.2
 
Advanced
 
campaign
 
security
 
a.
 
Burning
 
rubbish
 
b.
 
Paper
 
trails
 
c.
 
Sources
 
d.
 
Backups
 
e.
 
Tampering
 
f.
 
Autonomous
 
structuring
 
g.
 
Communications
 
2.3
 
Meetings
 
(Basics)
 
2.4
 
Meetings
 
(High
 
Security)
 
2.5
 
Secure
 
information
 
transfer
 
2.6
 
Gossiping
 
2.7
 
Being
 
monitored
 
3
 
Dealing
 
with
 
infiltrators
 
&
 
grasses
 
3.1
 
New
 
People
 
3.2
 
Do
 
you
 
have
 
an
 
infiltrator
 
3.3
 
Initial
 
action
 
&
 
gathering
 
evidence
 
3.4
 
Exposing
 
the
 
infiltrator
 
3.5
 
Dealing
 
with
 
the
 
fallout
 
3.6
 
Gatherings
 
3.7
 
Grasses
 
after
 
arrest
 
3.8
 
Other
 
infiltration
 
methods
 
3.9
 
Private
 
Investigators
 
&
 
Police
 
4
 
Security
 
For
 
Actions
 
4.1
 
Choosing
 
people
 
4.2
 
Scouting
 
out
 
the
 
area
 
4.3
 
Planning
 
4.4
 
Communications
 
4.5
 
Acquiring
 
equipment
 
4.6
 
Clothing
 
&
 
other
 
traceables
 
4.7
 
Disposing
 
of 
 
equipment/clothes
 
4.8
 
Communiqués
 
&
 
photos
 
4.9
 
Mobile
 
phones
 
4.10
 
Phone
 
boxes
 
4.11
 
CCTV
 
4.12
 
Travelling
 
4.13
 
Being
 
Chased
 
4.14
 
Evidence
 
gathering
 
tools
 
4.15
 
Debriefing
 
4.16
 
Shitting
 
in
 
your
 
backyard
 
4.17
 
Conclusion
 
5
 
Security
 
for
 
Demonstrations
 
5.1
 
General
 
Rules
 
5.2
 
Evidence
 
Gatherers
 
&
 
FIT
 
5.3
 
Cameras
 
5.4
 
Travelling
 
to
 
demonstrations
 
5.5
 
Debriefing
 
5.6
 
First
 
Aid
 
5.7
 
Dealing
 
with
 
Provocateurs
 
6
 
Personal
 
Security
 
6.1
 
Dealing
 
with
 
the
 
police
 
6.2
 
At
 
Home
 
6.2.1
 
Control
 
the
 
information
 
in
 
your
 
house
 
6.2.2
 
Preparing
 
for
 
a
 
raid
 
6.2.3
 
Phones,
 
computers
 
&
 
emails
 
6.2.4
 
Mail
 
6.2.5
 
Being
 
aware
 
of 
 
intruders
 
6.2.6
 
Being
 
bugged
 
6.3
 
Your
 
area
 
and
 
neighbours
 
6.4
 
Your
 
car
 
6.5
 
Self 
defence
 
6.6
 
Your
 
Personal
 
Profile
 
<New
 
in
 
this
 
edition>
 
6.6.1
 
Your
 
Online
 
Profile
 
<New
 
in
 
this
 
edition>
 
7
 
Surveillance
 
7.1
 
Preparation
 
for
 
surveillance
 
detection
 
7.2
 
Vehicles
 
7.3
 
On
 
foot
 
7.4
 
Rural
 
surveillance
 
7.5
 
Counter
surveillance
 
7.6
 
Blatant
 
surveillance
 
8
 
Computer
 
Security
 
&
 
Internet
 
Privacy
 
8.1
 
Security
 
8.2
 
Internet
 
Privacy
 
9
 
UK
 
Legal
 
Issues
 
9.1
 
Regulation
 
of 
 
Internet
 
Powers
 
Act
 
<UPDATED>
 
10
 
Talking
 
to
 
others
 
about
 
security
 
11
 
Future
 
shocks
 
12
 
Closed
 
Culture
 
vs.
 
Open
 
Culture
 
13
 
Writing
 
Letters
 
14
 
Mobile
 
Phones
 
<UPDATED>
 
15
 
Conclusion
 
16
 
Final
 
note,
 
contact
 
details
 
&
 
Disclaimer
 
 
3
1.
 
Introduction
 
This
 
booklet
 
is
 
an
 
introduction
 
to
 
security
 
for
 
action
 
and
 
activists.
 
It
 
is
 
hoped
 
it
 
will
 
provide
 
you
 
with
 
the
 
necessary
 
information
 
for
 
taking
 
action
 
and
 
for
 
effective
 
campaigning
 
in
 
the
 
face
 
of 
 
state
 
and
 
corporate
 
oppression.
 
The
 
authors
 
are
 
activists
 
who
 
have
 
been
 
taking
 
direct
 
action
 
and
 
campaigning
 
on
 
a
 
variety
 
of 
 
issues
 
for
 
many
 
years.
 
In
 
that
 
time
 
they
 
have
 
encountered
 
the
 
state
 
and
 
various
 
opponents
 
on
 
a
 
number
 
of 
 
different
 
levels
 
and
 
survived
 
to
 
tell
 
the
 
tale
 
(for
 
the
 
most
 
part).
 
It
 
is
 
a
 
summation
 
of 
 
our
 
experience
 
in
 
the
 
hope
 
that
 
it
 
helps
 
you
 
avoid
 
some
 
of 
 
our
 
mistakes.
 
Much
 
of 
 
the
 
material
 
in
 
this
 
book
 
is
 
common
 
sense.
 
There
 
is
 
a
 
lot
 
of 
 
information
 
contained
 
in
 
it
 
but
 
it
 
should
 
be
 
fairly
 
obvious
 
for
 
the
 
most
 
part.
 
You
 
will
 
not
 
need
 
all
 
of 
 
it,
 
but
 
you
 
should
 
find
 
the
 
information
 
to
 
deal
 
with
 
any
 
situation
 
you
 
may
 
be
 
in
 
or
 
planning
 
for.
 
In
 
places
 
we
 
have
 
been
 
repetitious
 
so
 
that
 
each
 
chapter
 
is
 
able
 
to
 
stand
 
as
 
much
 
as
 
possible
 
on
 
its
 
own,
 
though
 
we
 
urge
 
you
 
to
 
read
 
all
 
of 
 
this
 
chapter
 
 –
 
like
 
most
 
actions
 
and
 
campaigns,
 
the
 
philosophical
 
groundwork
 
is
 
vital.
 
The
 
approach
 
we
 
recommend
 
is
 
to
 
first
 
work
 
out
 
what
 
sort
 
of 
 
threat
 
you
 
feel
 
you
 
are
 
facing
 
and
 
learn
 
accordingly.
 
If 
 
you
 
do
 
not
 
need
 
to
 
worry
 
about
 
stuff 
 
because
 
you
 
are
 
not
 
active
 
in
 
a
 
particular
 
direction,
 
then
 
do
 
not
 
stress
 
about
 
it.
 
It
 
is
 
better
 
to
 
be
 
clear
 
about
 
what
 
you
 
are
 
doing
 
than
 
trying
 
to
 
be
 
everything.
 
If 
 
you
 
have
 
new
 
information
 
or
 
we
 
have
 
made
 
mistakes
 
then
 
please
 
let
 
us
 
know
 
at
 
handbook@activistsecurity.org
 
so
 
we
 
can
 
update
 
the
 
next
 
version.
 
This
 
is
 
vital
 
as
 
wrong
 
information
 
can
 
bring
 
about
 
to
 
a
 
false
 
sense
 
of 
 
security
 
which
 
in
 
turn
 
leads
 
to
 
actions
 
and
 
campaigns
 
being
 
compromised.
 
1.1
 
Why
 
security
 
is
 
important
 
Security
 
is
 
important
 
as
 
we
 
live
 
in
 
a
 
world
 
where
 
upsetting
 
the
 
status
 
quo
 
to
 
change
 
the
 
world
 
for
 
the
 
better
 
is
 
generally
 
met
 
by
 
a
 
backlash.
 
Governments,
 
law
 
enforcement
 
agencies
 
and
 
corporations
 
all
 
have
 
vested
 
interests
 
in
 
criminalizing,
 
disrupting
 
and
 
suppressing
 
activist
 
groups
 
of 
 
all
 
persuasions.
 
Security
 
is
 
needed
 
to
 
ensure
 
our
 
continued
 
success.
 
We
 
also
 
have
 
a
 
basic
 
right
 
to
 
protect
 
your
 
privacy
 
and
 
anonymity
 
from
 
unwarranted
 
intrusion.
 
For
 
those
 
who
 
say
 
that
 
we
 
shouldn’t
 
have
 
anything
 
to
 
hide
 
or
 
should
 
make
 
a
 
principled
 
stand
 
on
 
it,
 
well
 
we
 
live
 
in
 
a
 
world
 
where
 
democracy
 
is
 
subverted
 
daily
 
and
 
the
 
people
 
doing
 
it
 
the
 
most
 
are
 
those
 
in
 
power.
 
As
 
long
 
as
 
governments
 
and
 
their
 
supporting
 
apparatus
 
permit
 
corruption
 
through
 
their
 
closed
 
and
 
secretive
 
natures
 
then
 
we
 
need
 
to
 
respond
 
in
 
kind
 
for
 
our
 
own
 
protection.
 
Threats
 
do
 
not
 
 just
 
come
 
from
 
the
 
state.
 
There
 
are
 
situations
 
were
 
media
 
organisations
 
with
 
their
 
own
 
agenda
 
will
 
attempt
 
to
 
target
 
campaign
 
groups.
 
Private
 
investigators
 
also
 
need
 
to
 
be
 
factored
 
in
 
as
 
threats.
 
Both
 
have
 
distinct
 
issues
 
which
 
also
 
need
 
to
 
be
 
dealt
 
with
 
to
 
ensure
 
your
 
message
 
successfully
 
gets
 
to
 
the
 
public
 
without
 
being
 
intercepted
 
or
 
disrupted.
 
1.2
 
What
 
is
 
security?
 
Everybody
 
has
 
their
 
own
 
ideas
 
of 
 
what
 
security
 
is,
 
and
 
indeed
 
security
 
is
 
a
 
very
 
individual
 
issue.
 
Different
 
people
 
have
 
different
 
needs,
 
and
 
no
 
one
 
solution
 
fits
 
all.
 
What
 
works
 
for
 
someone
 
else
 
may
 
not
 
work
 
for
 
you.
 
However,
 
there
 
are
 
certain
 
fundamentals
 
that
 
apply
 
to
 
all
 
situations.
 
Security
 
is
 
a
 
 process
 
that
 
protects
 
you
 
in
 
some
 
fashion,
 
whether
 
in
 
the
 
run
 
up
 
to,
 
during
 
or
 
after
 
the
 
event(s)
 
you
 
are
 
involved
 
in.
 
This
 
means,
 
that
 
security
 
is
 
there
 
to
 
 facilitate
 
the
 
smooth
 
operation
 
of 
 
your
 
action,
 
campaign,
 
etc.
 
and
 
help
 
keep
 
everyone
 
safe.
 
A
 
common
 
mistake
 
is
 
equating
 
paranoia
 
with
 
security.
 
Paranoia
 
is
 
often
 
used
 
as
 
an
 
excuse
 
not
 
to
 
take
 
action
 
through
 
fear
 
of 
 
what
 
can
 
go
 
wrong
 
 –
 
normally
 
by
 
over
stating
 
the
 
omnipotence
 
of 
 
opponents.
 
In
 
our
 
experience
 
paranoid
 
people
 
have
 
little
 
to
 
fear
 
as
 
they
 
are
 
too
 
nervous
 
to
 
do
 
anything
 
that
 
would
 
actually
 
put
 
them
 
at
 
risk.
 
Indeed,
 
few
 
even
 
have
 
security
 
measures
 
put
 
in
 
place.
 
This
 
sort
 
of 
 
fear
 
means
 
you
 
effectively
 
defeat
 
yourself.
 
There
 
is
 
no
 
such
 
thing
 
as
 
a
 
100%
 
fail
safe
 
system,
 
and
 
not
 
doing
 
actions
 
because
 
you
 
cannot
 
reach
 
that
 
level
 
of 
 
security
 
is
 
not
 
an
 
excuse
 
for
 
copping
 
out.
 
There
 
is
 
always
 
some
 
risk;
 
and
 
security
 
processes
 
help
 
reduce
 
that
 
risk
 
to
 
an
 
acceptable
 
level.
 
It
 
is
 
up
 
to
 
you
 
to
 
define
 
what
 
the
 
acceptable
 
level
 
of 
 
risk
 
is
 
and
 
how
 
best
 
you
 
can
 
deal
 
with
 
it.
 
Sometimes
 
you
 
 just
 
have
 
to
 
take
 
a
 
chance.
 
Security
 
is
 
not
 
a
 
single
 
thing;
 
it
 
is
 
a
 
 process
 
and
 
a
 
state
 
of 
 
mind.
 
You
 
cannot
 
put
 
down
 
and
 
pick
 
up
 
security
 
at
 
whim.
 
For
 
security
 
to
 
be
 
effective
 
and
 
worth
 
the
 
time
 
and
 
effort
 
put
 
into
 
it,
 
it
 
has
 
to
 
be
 
built
 
into
 
your
 
life.
 
Ideally,
 
it
 
becomes
 
second
 
nature;
 
that
 
is,
 
you
 
automatically
 
go
 
through
 
the
 
processes
 
that
 
keep
 
you
 
secure.
 
This
 
creates
 
a
 
mindset
 
that
 
helps
 
you
 
avoid
 
errors
 
of 
 
 judgement
 
you
 
may
 
regret
 
later.
 
There
 
are
 
objects
 
and
 
software
 
that
 
will
 
aid
 
your
 
security,
 
but
 
simply
 
having
 
them
 
is
 
not
 
security
 
in
 
itself;
 
they
 
need
 
to
 
be
 
are
 
part
 
of 
 
an
 
active
 
security
 
process.
 
For
 
example,
 
there
 
is
 
no
 
point
 
having
 
a
 
bug
 
scanner
 
if 
 
you
 
don’t
 
use
 
it
 
on
 
a
 
regular
 
basis.
 
Likewise
 
anti
virus
 
software
 
will
 
not
 
protect
 
your
 
computer
 
unless
 
it
 
updated
 
regularly.
 

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->